Preview

Hacking

Better Essays
Open Document
Open Document
625 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking
HACKING

The incredibly fast development of the Internet has brought many benefits both to consumers and businesses.
However, it has also provided criminals or misguided individuals with great opportunities for crime or 'mischief'.
The Internet is not only used by innocent members of the public, but also by fraudulent traders, software pirates, hackers and con-artists, to name but a few.

A hacker is a person who breaks codes and passwords to gain unauthorized entry to computer systems.
Hackers can do an enormous amount of damage if they break into a computer system.
For some people, the challenge of breaking the codes is irresistible and so precautions have to be taken.
Stand-alone computers are usually safe as there is no connection for the hackers to break into. Computers which form part of networks or those with external links, such as attached modems, are in danger from hackers.
Many hackers often don't intend to cause damage or steal data, they just enjoy the challenge of breaking into a system. However, in some instances the hacker's purpose could be to commit fraud, to steal valuable data or to damage or delete the data in order to harm the company.
It might be hard to believe, but most hacking is carried out by employees with a grudge or those who want to 'make a quick buck'. They have insider knowledge of passwords and User IDs which makes it easy for them.

Data Theft

Data is often the most valuable resource any business has. The cost of creating data again from scratch can far outweigh the cost of any hardware or programs lost.
Physical theft or unauthorized access is the means of data theft.
Loss of data from hacking can have various consequences, some of which can be seen below.

Physically protecting systems

Businesses can use a range of physical methods to protect their systems and data.
Some of these include:
- Keeping important computers such as servers or mainframes in locked rooms
- Posting security guards

You May Also Find These Documents Helpful

  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Hacking is when a highly technical skilled individual or a group pass their way into a computer network or program without permission. This ends up in important data being stolen by the hacker which is illegal.…

    • 769 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Hacking into a computer is not allowed as it can disrupt the business as personal information can be stolen and also be used in crime, this can cause a problem in the businesses finance sector.…

    • 1633 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    That is why most big businesses have hired individuals that do what hackers do, which is to find gaps or spaces in an organisations or a person’s security and report the problem or at least fix/repair the space before it gets into the hands of worse hackers, very similar as to what Uber has done recently, which was that they paid a couple of hackers to delete their own stolen data on 57 million people. This is against the law…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Hacker: An individual who enjoys breaking systems or software without causing harm, presumably with the intent to better understand and improve security.…

    • 413 Words
    • 2 Pages
    Good Essays
  • Good Essays

    To elaborate, according to the article the government frequently encounters cyberattacks, ranging from groups like Anonymous, to more severe groups like Russian hackers Guccifer 2.0. Additionally, most of the hacks come from China and Russia and have had success with breaching security through a tactic called phishing. By sending links disguised as company or personal emails, hacker groups can easily infect computers with malware and other viruses. Although the hacks have mostly been targeted to gain unleaked and classified material, the capability for hacks with more severity is real.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Hackers: A hacker is someone who finds weaknesses in a computer or computer network, enters, and modifies or/and steals data this could slow down performance very much or even completely halt it.…

    • 555 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    hacktivists

    • 370 Words
    • 2 Pages

    Hackers have been around for a very long time. Hacks can range from disrupting websites, cracking data bases and releasing untold amounts of sensitive or private data. There are two different types of hackers, white hats and black hats. White hats are hackers that help prevent people that are on the other side of the law. Some white hats were once black hats that may have been caught and decided to work with government agency’s such as the FBI rather than go to jail. Black hats are hackers that hack for things such as personal gain or to simply disrupt or gain access to information that they want. Almost all hackers have an alias or a handle such as Dark Dante or C0mrade.…

    • 370 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Imagine yourself going into the bank to get money out of your account for your rent or other important bill, and the account is dry and you just got paid the day before..or going to pay a bill with your credit card and card after card is maxed out then you find out that someone has stolen all your information and used all of your resources to live and pay bills. If this happened to me my heart would be beating so fast in panic id probably pass out considering I have so many kids to provide for. Well it happens everyday to people everywhere all over the world. One of the major problems causing this is called hacking which is defined by the company who created the website the free dictonary dot com, Houghton mifflin company, as to gain access to a computer file or network illegally or without authorization. It is a big problem not just here but in other countries as well.One incident id like to mention is the playstation store being hacked into…

    • 521 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computer Crimes

    • 679 Words
    • 3 Pages

    a thrill to figure out how to break into a computer. Most people never have any…

    • 679 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hacking

    • 4142 Words
    • 17 Pages

    their pursuit of information, so are we. The thrill of the hack is not in…

    • 4142 Words
    • 17 Pages
    Good Essays
  • Better Essays

    Hacking is unauthorized access to a computer system intentionally releasing computer viruses, according to (Baase 2008). Hacking remains one of the largest forms of theft with millions of dollars being stolen yearly. Hacking, for many early years did not have such negative impact on our society or was not taken as serious as it is today. Hacking in earlier years…

    • 1662 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    Computer Hacking

    • 306 Words
    • 2 Pages

    In 1970, Bill Gates hacked into a computer network and completely shut the entire network down by uploading a virus he created. He was severely punished and was not allowed to use computers for an entire year but five years later, Microsoft was founded. Although one might argue that hackers such as Gateds are essential to the development and the bettering of computers and security and such, I believe that if no one was attempting to hack into things, there would not be such a large demand for constant security changes.…

    • 306 Words
    • 2 Pages
    Satisfactory Essays